Skip to content
View lfuret's full-sized avatar

Block or report lfuret

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Various ways to execute shellcode

C# 505 79 Updated Mar 13, 2024

A public collection of POCs & Exploits for the vulnerabilities I discovered

Objective-C 396 41 Updated Sep 17, 2025

Defeating Windows User Account Control

C 7,115 1,397 Updated Jul 8, 2025

some gadgets about windows process and ready to use :)

C 611 96 Updated Oct 7, 2023

iPhone 11 emulated on QEMU

C 2,171 476 Updated Oct 22, 2022

Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.

915 100 Updated May 20, 2024

Never ever ever use pixelation as a redaction technique

TypeScript 8,153 798 Updated Mar 15, 2024

A small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8.

C 269 70 Updated Apr 24, 2025

Gather and update all available and newest CVEs with their PoC.

HTML 7,335 927 Updated Nov 8, 2025

Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)

460 83 Updated Nov 19, 2024

🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)

C 3,174 692 Updated Feb 15, 2023

Automatically Collect POC or EXP from GitHub by CVE ID.

Python 1,095 221 Updated Nov 8, 2025

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

C++ 6,684 1,240 Updated Jul 14, 2025

The goal of this repository is to document the most common techniques to bypass AppLocker.

PowerShell 2,022 365 Updated Sep 11, 2023

Corpus of public v8 vulnerability PoCs.

JavaScript 218 45 Updated Jun 5, 2021

Ubuntu OverlayFS Local Privesc

C 429 136 Updated Apr 2, 2024

🐧 Abuse of Google Colab for cracking hashes.

Jupyter Notebook 963 143 Updated Jul 17, 2023

kernel-pwn and writeup collection

C 670 35 Updated Oct 2, 2023

Sudo Baron Samedit Exploit

Python 780 172 Updated Jan 13, 2022

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 12,291 1,451 Updated Sep 17, 2025

Defund the Police.

13,143 2,652 Updated Jun 7, 2024

GlibC Malloc for Exploiters presentation

JavaScript 151 16 Updated Jun 22, 2019

The Damn Vulnerable Router Firmware Project

HTML 31 3 Updated Feb 5, 2018

lscan is a library identification tool on statically linked/stripped binaries

Max 404 50 Updated Dec 1, 2020

Lab for exploring SSRF vulnerabilities

CSS 248 58 Updated May 30, 2021

Rip web accessible (distributed) version control systems: SVN/GIT/HG...

Perl 1,763 318 Updated Jul 19, 2024

Repository of the official Docker image for SideChannelMarvels.

Shell 54 22 Updated Feb 6, 2018

A tool to perform (higher-order) correlation power analysis attacks (CPA).

C++ 163 36 Updated Jan 27, 2022

Repository of small utilities related to key recovery

C 263 74 Updated Mar 30, 2024

Tools to perform differential fault analysis attacks (DFA).

Python 356 84 Updated Oct 13, 2023
Next